Analysis
-
max time kernel
144s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 19:21
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe
Resource
win7-20240729-en
General
-
Target
2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe
-
Size
1.2MB
-
MD5
fdd7e87ad52595b29319ed6913082369
-
SHA1
8d9336fcf82ff83bebcbbf363913d1dbc7f6846d
-
SHA256
29c06576121aff21a4995e0fc974d5b03db057a1c9a60663d52156f3106581bb
-
SHA512
9938d19e8902b009067176c544cd8bc7355ca081f73de7574e45f509fba7a313dd226412b8de19f3a21e3de29583cd9f2dd11fbd42bdab598eaf889be94cd9f4
-
SSDEEP
24576:07GO7dtrjrICw9XuXo7beSTdt5xbX02uvfTXfBxrj3d5E/jKQvVj4YpdjYY0td78:1EtnrICSooGSTD5xbX022fjBxrj3
Malware Config
Extracted
bdaejec
ddos.dnsnb8.net
Signatures
-
Bdaejec family
-
Detects Bdaejec Backdoor. 1 IoCs
Bdaejec is backdoor written in C++.
resource yara_rule behavioral1/memory/2340-30-0x0000000000E80000-0x0000000000E89000-memory.dmp family_bdaejec_backdoor -
resource yara_rule behavioral1/files/0x000b00000001225e-1.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2340 tEeXhvT.exe -
Loads dropped DLL 2 IoCs
pid Process 1732 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe 1732 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\launcher.exe tEeXhvT.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe tEeXhvT.exe File opened for modification C:\Program Files\Windows Journal\Journal.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe tEeXhvT.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe tEeXhvT.exe File opened for modification C:\Program Files\Windows Sidebar\sidebar.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE tEeXhvT.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe tEeXhvT.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe tEeXhvT.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\excelcnv.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE tEeXhvT.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe tEeXhvT.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jre7\bin\javaws.exe tEeXhvT.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE tEeXhvT.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\native2ascii.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe tEeXhvT.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe tEeXhvT.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe tEeXhvT.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe tEeXhvT.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE tEeXhvT.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe tEeXhvT.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe tEeXhvT.exe File opened for modification C:\Program Files\Windows Mail\wab.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe tEeXhvT.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe tEeXhvT.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe tEeXhvT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tEeXhvT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2340 1732 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe 30 PID 1732 wrote to memory of 2340 1732 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe 30 PID 1732 wrote to memory of 2340 1732 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe 30 PID 1732 wrote to memory of 2340 1732 2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe 30 PID 2340 wrote to memory of 2860 2340 tEeXhvT.exe 31 PID 2340 wrote to memory of 2860 2340 tEeXhvT.exe 31 PID 2340 wrote to memory of 2860 2340 tEeXhvT.exe 31 PID 2340 wrote to memory of 2860 2340 tEeXhvT.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-08_fdd7e87ad52595b29319ed6913082369_smoke-loader_wapomi.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\tEeXhvT.exeC:\Users\Admin\AppData\Local\Temp\tEeXhvT.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\2e187f66.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189B
MD5f1edaf60f542ea048fe22fb86ca4b597
SHA1fe4e4497ce14d6ff7bd93befebcd65184ecff987
SHA256ecaf641b64dc6bbc7ae70631f5dbb1b5b4e8e54a238f3cfa40627db1ec83cb1e
SHA51288d555490168a21c43c529928d025a76bb5086e9567319f5b3ff8a4468422748c557265add25395023d86f6ec09543e2f0a1cf31ad45386d752bf7897f029d53
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e